Skip to content
Threat Feed

Product

Kubernetes

8 briefs RSS
medium advisory

Suspicious Pod Creation in Kubernetes System Namespace

An attacker may deploy a pod within the kube-system namespace in Kubernetes to mimic legitimate system pods and evade detection.

Kubernetes pod kube-system container
2r 1t
medium advisory

Kubernetes Event Deletion for Defense Evasion

An adversary may delete Kubernetes events to evade detection and hide malicious activity within a Kubernetes environment by removing audit logs.

Kubernetes stealth defense-evasion
2r 1t
medium advisory

Kubernetes Sensitive Role Creation or Modification

Detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs, potentially leading to privilege escalation or unauthorized access within the cluster.

Kubernetes rbac privilege-escalation persistence
2r 2t
high advisory

Kubernetes RBAC Wildcard Elevation on Existing Role

The rule detects when a Kubernetes Role or ClusterRole is patched or updated to grant wildcard verbs and resources, effectively granting cluster-admin-like privileges, which is often a deliberate privilege expansion and could indicate malicious activity.

kubernetes rbac privilege-escalation
2r 1t
medium advisory

Kubernetes Secret Access by Node or Pod Service Account

This rule detects Kubernetes audit events where a node or pod service account attempts to read secrets directly, which is often a sign of credential access.

kubernetes credential-access cloud
2r 1t
high advisory

Kubernetes Secret Access with Suspicious User Agent

Detects read access to Kubernetes Secrets (`get`/`list`) with a user agent matching a curated set of non-standard or attacker-leaning clients, indicating potential credential access.

kubernetes credential-access cloud
2r 1t
high advisory

Kubernetes Rapid Secret GET Activity Against Multiple Objects

Detects an unusual volume of Kubernetes API get requests against multiple distinct Secret objects from the same client fingerprint, potentially indicating credential access or in-cluster reconnaissance.

Kubernetes credential-access threat-detection
2r 1t
high advisory

Kubernetes Secrets Enumeration from Non-Loopback Client

Detection of Kubernetes Secrets listing from non-loopback clients targeting cluster-wide secrets or sensitive namespaces, potentially indicating unauthorized credential access or discovery.

kubernetes credential-access discovery cloud
2r 2t